SlideShare a Scribd company logo
Being Ready for
GDPR
Jessvin Thomas
Jessvin.Thomas@skoutsecure.com
SIM NY
February 21, 2018
JessvinThomas
CTO
Selected Background
Next Generation SOC,
Orchestration & Analytics
Internal Information Security
Investments in Carbon Black,
Cylance, iSight Partners
Cloud, Automation & Tooling for
consumer internet services
2
Agenda
1. What makes GDPR different
2. Principles of GDPR
3. GDPR Pyramid
4. Your responsibilities
5. Data Protection as part of security
6. Takeaways & Checklist
“We believe that data is the phenomenon of our time. It is the world's new
natural resource. It is the new basis of competitive advantage, and it is
transforming every profession and industry. If all of this is true – even
inevitable – then cyber crime, by definition, is the greatest threat to every
profession, every industry, every company in the world.”
Ginni Rometty, CEO IBM
IBM Security Summit
New York City May 14, 2015
What males GDPR
DIFFERENT
Data confidentiality as the
only concern.
Perimeter Oriented Protection
Personal Data Rights
What males GDPR
DIFFERENT
Personal Data includes:
Electronic tracking – IP addresses,
emails etc.
Genetic data
Cultural Data & Affiliations
Social Identity
What males GDPR
DIFFERENT
4%
GDPR
Principles
02
03
Free Data Movement
Personal Data Rights
Data Protection by Design
01
Who is on the
Hook?
Data Controller
Data Processor
Body which, alone or jointly
with others, determines the
purposes and means of the
processing of personal data;
body which processes
personal data on behalf of
the controller
Controller
Responsibilities
processed lawfully, fairly and in a transparent manner
for specified, explicit and legitimate purposes
Protected in a manner that ensures appropriate
security
adequate, relevant and limited to what is necessary
accurate and, where necessary, kept up to date
kept in a form which permits identification of data
subjects for no longer than is necessary
Thingsyoumayhaveheardof
Consent & Opt Out Right to Erasure Portability
Requirements for Processing vary by:
reasons for processing
and
method of data acquisition
01 Personal Data
02
03
Processing Purposes
04
Processing Authorization
05
Processing Requirements
Pyramid
of GDPR
Rights to Personal Data
01
Personal Data
02
03
Digital ID
Special Categories
Identifying Data: Direct or Indirect:
01
02
Processing Purposes
02
03
Marketing & Profiling
• Monitoring of the behavior of such data subjects in so
far as their behavior takes place within the Union.
• Profiling a natural person, particularly in order to take
decisions concerning her or him or for analyzing or
predicting her or his personal preferences, behaviors
and attitudes.
Corporate / Employer
Services
• goods or services to such data subjects irrespective of
whether connected to a payment.
Scientific, Research or Statistical Purposes
04
01
03
Processing
Authorization
02
03
Contract Performance
Legal Obligation
Consent
04 Protect Vital Interests
05 Protect Public Interests
06 Protect Controller Interests
01
03
Processing
Authorization
For consent:
• controller shall be able to demonstrate that the
data subject has consented
• request presented in a manner which is clearly
distinguishable from the other matters
• request in an intelligible and easily accessible
form, using clear and plain language.
• data subject shall has right to withdraw his or
her consent at any time.
• It shall be as easy to withdraw as to give
consent.
• consent is freely given
• processing is only for what is needed to execute
the contract
01 Consent
Rights to Personal Data
Layman’s Terms
Right to Collection Metadata
Access Data
Fix Accuracy
Erasure
Data Portability
Object & Restrict Processing
Human Intervention
04
05
Processing
Requirements
02
03
Records Management
Security
Controller/Process Requirements
04 Breach Notification:
Supervisory Authority
05 Breach Notification:
Data Subject
01
05
Processing
Requirements
• processor shall not engage another processor
without prior specific or general written
authorization of the controller.
• Processing by a processor shall be governed by a
binding contract that sets out:
• the subject-matter
• duration of the processing
• nature of the processing
• type of personal data and categories of
data subjects
• the obligations and rights of the controller.
• processor only on documented instructions from
the controller
• ensures that persons authorized to process have
committed to confidentiality
• takes all measures required pursuant to security
• at choice of controller, deletes or returns all the
personal data to the controller after the end of
the provision* deletes existing copies
• makes available to the controller all information
necessary to demonstrate compliance with the
obligations laid out
01 Controller/Process Requirements
05
Processing
Requirements
02 Records Management
• Each controller and processor shall maintain a
record of processing containing:
• the name and contact details of the
controller/processor and the data protection
officer
• the purposes of the processing;
• a description of the categories of data subjects
and of the categories of personal data;
• the categories of recipients to whom the
personal data have been or will be disclosed
• transfers to a third country or an international
organization and suitable safeguards
• where possible, the envisaged time limits for
erasure of the different categories of data;
• where possible, a general description security
measures
05
Processing
Requirements
03 Security
• Taking existing capability, costs, nature, scope, context
of processing, controller & processor shall implement
security appropriate to the risk of disclosure impacting
rights and freedoms of natural persons such as:
• the pseudonymisation and encryption of personal data
• the ability to ensure the ongoing confidentiality,
integrity, availability and resilience of processing
systems and services; * the ability to restore the
availability and access to personal data in a timely
manner in the event of a physical or technical incident;
• a process for regularly testing, assessing effectiveness of
security of processing
05
Processing
Requirements
04 Breach Notification:
Supervisory Authority
• Controller shall without delay and by 72 hours
notify supervisory authority unless the personal
data breach is unlikely to result in a risk to the
rights and freedoms of natural persons.
• Where the notification to the supervisory
authority is not made within 72 hours, it shall be
accompanied by reasons for the delay.
• The processor shall notify the controller without
undue delay after becoming aware of a personal
data breach.
• The notification shall at least:
• describe nature of breach including where
possible, the categories and approximate number
of data subjects concerned and the categories and
approximate number of personal data records
concerned;
• communicate the name and contact details of the
data protection officer or other contact point
where more information can be obtained;
• describe the likely consequences of the personal
data breach;
• describe the measures taken or proposed to be
taken by the controller to address the personal
data breach, including, where appropriate,
measures to mitigate its possible adverse effects.
05
Processing
Requirements
05
Breach Notification:
Data Subject
• When the personal data breach is likely to
result in a high risk to the rights and freedoms
of natural persons, the controller shall
communicate the personal data breach to the
data subject without undue delay.
01
02
03
04
Data Protection Officer
Impact Assessment
Code of Conduct
Transfer to Third Countries
05
Specific Situations
Miscellaneous
Conditions
Transfers to
Third Countries
What
Customers
usually ask for
01
02
03
04
Standard Commission Clauses
Notification in 72 hours or less
Data Protection Officer
Non-transfer or collection of data
DataProtectionisstillpartof thesecurityprogram
People
ApplicationsInfrastructure
Protect weak links to where attacks
gain a foothold in the environment
Ensure a incident response plan is
documented and practiced
Data Protection will be part of the fabric
U.S. Bancorp hit with fines for poor
compliance with anti-money-laundering laws
Federal regulators on Thursday hit U.S. Bancorp, the nation's
biggest regional bank, with more than $800 million in fines for
deficient anti-money laundering practices.
2016 Revenue: $21B
Impact: 3.8%
Key Takeaways
01 Data Protection is as much about usage as disclosure
02
GDPR is focused on the rights of individuals:
Data Analytics and methods of identifying individuals are impacted
03 The purpose you collect the data for impacts the complexity of oversight
04 When consent is required, Erasure, Accuracy, Portability and objections come into play
05 For security pseudonymization, encryption and breach notification are important
06 A documented and followed data privacy design will go a long way
Thank You

More Related Content

What's hot

New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management
Jerika Phelps
 
New Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementNew Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS Management
Black Duck by Synopsys
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
EQS Group
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to Know
Rachel Roach
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Data Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPRData Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPR
ImogenRutherford
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Amy Purcell
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
Dovetail Software
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
Happiest Minds Technologies
 
Data Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service OverviewData Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service Overview
DVV Solutions Third Party Risk Management
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
Spain-Holiday.com
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
WhitmeyerTuffin
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Chris Doolittle
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
IT Governance Ltd
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
David Cunningham
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
Ulf Mattsson
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services EL
Eugene Lee
 
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
GDPR: 3 Months On | Guest Speaker: Data Protection CommissionersGDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
BrightPay Payroll and Auto Enrolment Software
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
Harrison Clark Rickerbys
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
Greg Ezeilo
 

What's hot (20)

New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management
 
New Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementNew Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS Management
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to Know
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Data Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPRData Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPR
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
Data Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service OverviewData Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service Overview
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services EL
 
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
GDPR: 3 Months On | Guest Speaker: Data Protection CommissionersGDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 

Similar to Getting Ready for GDPR

Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
Jessvin Thomas
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
ControlCase
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
Vuzion
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
BrightPay Payroll and Auto Enrolment Software
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
Fionnuala Hendrick
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
Cobweb
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
GrittyCC
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
SecurityScorecard
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
James Mulhern
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
Kwanzoo Inc
 
Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19
Niall Rooney
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
Harrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
Harrison Clark Rickerbys
 
Administrative and public law seminar
Administrative and public law seminarAdministrative and public law seminar
Administrative and public law seminar
Browne Jacobson LLP
 
Public sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, ExeterPublic sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, Exeter
Browne Jacobson LLP
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
Case IQ
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
BrightPay Payroll and Auto Enrolment Software
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
PECB
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
Symantec
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Financial Poise
 

Similar to Getting Ready for GDPR (20)

Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
 
Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19Niall Rooney FD Event 05.09.19
Niall Rooney FD Event 05.09.19
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
Administrative and public law seminar
Administrative and public law seminarAdministrative and public law seminar
Administrative and public law seminar
 
Public sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, ExeterPublic sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, Exeter
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 

Recently uploaded

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 

Recently uploaded (19)

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 

Getting Ready for GDPR

  • 1. Being Ready for GDPR Jessvin Thomas Jessvin.Thomas@skoutsecure.com SIM NY February 21, 2018
  • 2. JessvinThomas CTO Selected Background Next Generation SOC, Orchestration & Analytics Internal Information Security Investments in Carbon Black, Cylance, iSight Partners Cloud, Automation & Tooling for consumer internet services 2
  • 3. Agenda 1. What makes GDPR different 2. Principles of GDPR 3. GDPR Pyramid 4. Your responsibilities 5. Data Protection as part of security 6. Takeaways & Checklist
  • 4. “We believe that data is the phenomenon of our time. It is the world's new natural resource. It is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true – even inevitable – then cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.” Ginni Rometty, CEO IBM IBM Security Summit New York City May 14, 2015
  • 5. What males GDPR DIFFERENT Data confidentiality as the only concern. Perimeter Oriented Protection Personal Data Rights
  • 6. What males GDPR DIFFERENT Personal Data includes: Electronic tracking – IP addresses, emails etc. Genetic data Cultural Data & Affiliations Social Identity
  • 8. GDPR Principles 02 03 Free Data Movement Personal Data Rights Data Protection by Design 01
  • 9. Who is on the Hook? Data Controller Data Processor Body which, alone or jointly with others, determines the purposes and means of the processing of personal data; body which processes personal data on behalf of the controller
  • 10. Controller Responsibilities processed lawfully, fairly and in a transparent manner for specified, explicit and legitimate purposes Protected in a manner that ensures appropriate security adequate, relevant and limited to what is necessary accurate and, where necessary, kept up to date kept in a form which permits identification of data subjects for no longer than is necessary
  • 11. Thingsyoumayhaveheardof Consent & Opt Out Right to Erasure Portability Requirements for Processing vary by: reasons for processing and method of data acquisition
  • 12. 01 Personal Data 02 03 Processing Purposes 04 Processing Authorization 05 Processing Requirements Pyramid of GDPR Rights to Personal Data
  • 13. 01 Personal Data 02 03 Digital ID Special Categories Identifying Data: Direct or Indirect: 01
  • 14. 02 Processing Purposes 02 03 Marketing & Profiling • Monitoring of the behavior of such data subjects in so far as their behavior takes place within the Union. • Profiling a natural person, particularly in order to take decisions concerning her or him or for analyzing or predicting her or his personal preferences, behaviors and attitudes. Corporate / Employer Services • goods or services to such data subjects irrespective of whether connected to a payment. Scientific, Research or Statistical Purposes 04 01
  • 15. 03 Processing Authorization 02 03 Contract Performance Legal Obligation Consent 04 Protect Vital Interests 05 Protect Public Interests 06 Protect Controller Interests 01
  • 16. 03 Processing Authorization For consent: • controller shall be able to demonstrate that the data subject has consented • request presented in a manner which is clearly distinguishable from the other matters • request in an intelligible and easily accessible form, using clear and plain language. • data subject shall has right to withdraw his or her consent at any time. • It shall be as easy to withdraw as to give consent. • consent is freely given • processing is only for what is needed to execute the contract 01 Consent
  • 17. Rights to Personal Data Layman’s Terms Right to Collection Metadata Access Data Fix Accuracy Erasure Data Portability Object & Restrict Processing Human Intervention 04
  • 18. 05 Processing Requirements 02 03 Records Management Security Controller/Process Requirements 04 Breach Notification: Supervisory Authority 05 Breach Notification: Data Subject 01
  • 19. 05 Processing Requirements • processor shall not engage another processor without prior specific or general written authorization of the controller. • Processing by a processor shall be governed by a binding contract that sets out: • the subject-matter • duration of the processing • nature of the processing • type of personal data and categories of data subjects • the obligations and rights of the controller. • processor only on documented instructions from the controller • ensures that persons authorized to process have committed to confidentiality • takes all measures required pursuant to security • at choice of controller, deletes or returns all the personal data to the controller after the end of the provision* deletes existing copies • makes available to the controller all information necessary to demonstrate compliance with the obligations laid out 01 Controller/Process Requirements
  • 20. 05 Processing Requirements 02 Records Management • Each controller and processor shall maintain a record of processing containing: • the name and contact details of the controller/processor and the data protection officer • the purposes of the processing; • a description of the categories of data subjects and of the categories of personal data; • the categories of recipients to whom the personal data have been or will be disclosed • transfers to a third country or an international organization and suitable safeguards • where possible, the envisaged time limits for erasure of the different categories of data; • where possible, a general description security measures
  • 21. 05 Processing Requirements 03 Security • Taking existing capability, costs, nature, scope, context of processing, controller & processor shall implement security appropriate to the risk of disclosure impacting rights and freedoms of natural persons such as: • the pseudonymisation and encryption of personal data • the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; * the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; • a process for regularly testing, assessing effectiveness of security of processing
  • 22. 05 Processing Requirements 04 Breach Notification: Supervisory Authority • Controller shall without delay and by 72 hours notify supervisory authority unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. • Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay. • The processor shall notify the controller without undue delay after becoming aware of a personal data breach. • The notification shall at least: • describe nature of breach including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned; • communicate the name and contact details of the data protection officer or other contact point where more information can be obtained; • describe the likely consequences of the personal data breach; • describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.
  • 23. 05 Processing Requirements 05 Breach Notification: Data Subject • When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay.
  • 24. 01 02 03 04 Data Protection Officer Impact Assessment Code of Conduct Transfer to Third Countries 05 Specific Situations Miscellaneous Conditions
  • 26. What Customers usually ask for 01 02 03 04 Standard Commission Clauses Notification in 72 hours or less Data Protection Officer Non-transfer or collection of data
  • 27. DataProtectionisstillpartof thesecurityprogram People ApplicationsInfrastructure Protect weak links to where attacks gain a foothold in the environment Ensure a incident response plan is documented and practiced
  • 28. Data Protection will be part of the fabric U.S. Bancorp hit with fines for poor compliance with anti-money-laundering laws Federal regulators on Thursday hit U.S. Bancorp, the nation's biggest regional bank, with more than $800 million in fines for deficient anti-money laundering practices. 2016 Revenue: $21B Impact: 3.8%
  • 29. Key Takeaways 01 Data Protection is as much about usage as disclosure 02 GDPR is focused on the rights of individuals: Data Analytics and methods of identifying individuals are impacted 03 The purpose you collect the data for impacts the complexity of oversight 04 When consent is required, Erasure, Accuracy, Portability and objections come into play 05 For security pseudonymization, encryption and breach notification are important 06 A documented and followed data privacy design will go a long way