SlideShare a Scribd company logo
© 2017 TrustArc Inc Proprietary and Confidential Information
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
PRIVACY INSIGHT SERIES
Mastering Article 30 Compliance:
Conducting, Maintaining & Reporting on
Your Data Inventory
August 16, 2017
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Thank you for joining the webinar
• We will start 2-3 minutes after the hour
• This webinar will be recorded – both the recording and
slides will be sent out via email later today
• Please use the GotoWebinar Control Panel on the right
hand side to submit any questions for the speakers
2
“Mastering Article 30 Compliance:
Conducting, Maintaining and Reporting
on your Data Inventory”
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Today’s Speakers
Charles Nwasor
Director, Global Assurance & Advisory
Ensono
Paul Iagnocco
Senior Privacy Consultant
TrustArc
Margaret Alston, CIPP/G/C/M
Consulting Program Director
TrustArc
Eleanor Treharne-Jones
VP Sales & Consulting
TrustArc
3
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
The EU GDPR – May 25, 2018 Deadline
Significant Compliance Requirements
4
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Help is Needed Across Wide Range of Areas
78% of Companies looking for help with Data Inventory & Mapping
Question: “Below is a list of tasks related to data privacy compliance. For each task please indicate the amount of
additional help you will need to accomplish these tasks in 2017.”
22%
22%
23%
23%
25%
25%
25%
26%
30%
36%
39%
41%
53%
51%
53%
57%
52%
53%
57%
49%
45%
46%
38%
25%
26%
23%
18%
23%
21%
17%
21%
19%
15%
0% 20% 40% 60% 80% 100%
Obtaining and managing user consent
Creating a vendor risk management program
Managing privacy complaints and individual rights
Managing privacy incidents and breach notification
Implementing privacy by design / privacy engineering
Data de-identification / anonymization
Creating data inventory and maps
Conducting privacy risk assessments, PIAs, DPIAs
Meeting regulatory reporting requirements
Addressing international data transfer (Privacy Shield, APEC CBPR, BCRs, etc.)
Developing a GDPR privacy plan
Need significant help Need some help Don't need help
TrustArc / Dimensional Research 2017
5
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Today’s Agenda
• What’s Required Under Article 30
of the GDPR?
• Tools & Methodologies
• Getting Internal Buy-in
• Scoping and Prioritization
• Addressing Third Parties
• What is a Data Map?
• You’ve completed a Data Inventory
Mapping Exercise – What’s Next?
6
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Poll Question
Have you completed a data inventory yet?
4%
TrustArc / Dimensional Research 2017
A. We haven’t started
B. We have an existing inventory that we’re looking to update
C. We have allocated resources (people/technology) to complete this
D. We are in the process of completing our inventory
E. We have a completed data inventory
7
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
What’s required under Article 30
of the GDPR?
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
GDPR Article 30 – What’s Actually Required?
Art. 30 GDPR = Records of Processing Activities
– Each controller and, where applicable, the controller's representative, shall
maintain a record of processing activities under its responsibility.
– Each processor and, where applicable, the processor's representative shall
maintain a record of all categories of processing activities carried out on behalf
of a controller
– The records shall be in writing, including in electronic form.
– The controller or the processor and, where applicable, the controller's or
the processor's representative, shall make the record available to the
supervisory authority on request.
– The obligations shall not apply to an enterprise or an organisation employing
fewer than 250 persons unless the processing it carries out is likely to result in a
risk to the rights and freedoms of data subjects, the processing is not
occasional, or the processing includes special categories of data as referred to
in Article 9(1) or personal data relating to criminal convictions and offences
referred to in Article 10.
9
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
What’s Actually Required?
• Applies equally to controllers
and processors
• What’s meant by a “record”?
• Available on demand following
request from a regulator
• No explicit requirement for
data mapping
• Certain exemptions for SMEs
10
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Records of Processing Activities for Controllers
Each controller and, where applicable, the controller's representative,
shall maintain a record of processing activities under its responsibility.
That record shall contain all of the following information:
• the name and contact details of the controller and, where applicable, the joint
controller, the controller's representative and the data protection officer;
• the purposes of the processing;
• a description of the categories of data subjects and of the categories of personal data;
• the categories of recipients to whom the personal data have been or will be disclosed
including recipients in third countries or international organisations;
• where applicable, transfers of personal data to a third country or an international
organisation, including the identification of that third country or international
organisation and, in the case of transfers referred to in the second subparagraph of
Article 49(1), the documentation of suitable safeguards;
• where possible, the envisaged time limits for erasure of the different categories of data;
• where possible, a general description of the technical and organisational security
measures referred to in Article 32(1).
11
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Records of Processing Activities for Processors
Each processor and, where applicable, the processor's representative
shall maintain a record of all categories of processing activities carried
out on behalf of a controller, containing:
• the name and contact details of the processor or processors and of each controller on
behalf of which the processor is acting, and, where applicable, of the controller's or
the processor's representative, and the data protection officer;
• the categories of processing carried out on behalf of each controller;
• where applicable, transfers of personal data to a third country or an international
organisation, including the identification of that third country or international
organisation and, in the case of transfers referred to in the second subparagraph of
Article 49(1), the documentation of suitable safeguards;
• where possible, a general description of the technical and organisational security
measures referred to in Article 32(1).
12
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Approach, Methodology & Tools
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Systems vs Business Process Inventory
IT/Systems Based
Approach
“Show me all the systems
and applications being
used to process or store our data.”
Process Based
Approach
“Show me all of our business
processes that contain
personal information.”
14
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Systems vs Business Process Inventory
IT/Systems Based Approach:
“Show me all the systems and applications being used to process or store
our data”
Database
HR data
Payroll data
Employee data
Customer data
Platform/
UI
SFDC
ADP
Oracle
Gmail
HR
Manager
US
HR
Manager
UK
Employee
CFO
15
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Systems vs Business Process Inventory
Process Based Approach:
“Show me all of our business processes that contain personal information”
Employee ADP Gmail
HR
Manager
UK
HR
Manager
US
16
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Sample Business Process Documentation
17
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Poll Question
What approach have you taken to your data inventory?
4%
18
TrustArc / Dimensional Research 2017
A. Business Process inventory
B. Asset/systems inventory
C. Not yet started a data inventory
18
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Methodology & Tools
Discovery Process
• Questionnaires
• Interviews
• Automated Scanning
• Automated Feeds/Uploads
Ongoing maintenance
• Spreadsheets
• Data Inventory & Mapping Tools
19
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Sample Data Inventory Spreadsheets
20
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Sample Business Process Mapping
21
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Getting Internal Buy-In
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Getting Buy-In
Business Unit Engagement Focus Benefits to BU & Business
Information
Technology
identifying storage redundancies • Reduce infrastructure
complexity
• Cost savings
Information
Security
understanding what data reside
in which systems
• Prioritize protection efforts –
focus on high risk, high value
• Establish appropriate access
controls
• Cost savings
Operations visualizing flows and uses of data
throughout the
company
• Reduce redundancies
• Improve efficiencies
• Cost savings
Procurement identifying points at which the
company shares information with
third party vendors and
understanding the sensitivity
of the data being shared
• Support risk-based vendor
management
• Greater efficiency in contract
management
• Cost savings
23
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Scoping & Prioritization
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Knowing where to start…
• Identify any previous inventories or documentation
within the business that you can leverage –
examples include:
– asset inventory (typically held by IT)
– vendor lists
• Start by identifying the people you want to speak to
(key stakeholders) within each of your business
units and use these numbers to start to build
approximate numbers and details of business
processes in scope
• Consider starting with a pilot project with one
business unit to test and validate your methodology
and use early deliverables to secure better
engagement for the broader project
25
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Addressing Third Parties
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Addressing Third Parties
• Need to know which third party vendors are either
in the EU or that may handle EU personal data
• Make an inventory, then classify the vendors
• Develop customized policy and procedures for
initial vendor vetting, on-going reviews and
audits, and end-of-relationship activities
27
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Poll Question
What are the main obstacles that you have encountered?
4%
28
TrustArc / Dimensional Research 2017
A. Lack of budget
B. Lack of engagement
C. Managing alongside business priorities
D. Scoping
E. Tools to manage on an ongoing basis
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
What’s a Data Map?
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Data Mapping
• The GDPR doesn’t actually require
data maps rather a “record of
processing activities”
• However it is hard to capture the multi-linear
connections between different data flows and
assets without some form of visualization
• Data visualizations or “maps” help companies
to understand the data they hold and build in
controls to manage any inherent risk
• Many different approaches exist –
common tools include Visio and LucidChart
30
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Data Mapping – TrustArc Today
31
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Data Mapping – TrustArc Tomorrow
32
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
You’ve Completed a Data
Inventory & Mapping Exercise –
What’s Next?
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
What’s Next?
• Identifying Tools and Methodologies to Scale
and Maintain the Data Inventory
• Developing Article 30 Compliance Reporting
• Using as foundation for ongoing
GDPR Compliance Program
• Identifying Inherent Risk and
Completing DPIAs as required under Article 35
• Ongoing Training on Inventory Change
Management
• Share with Cross-functional Teams for broader
organizational benefit
34
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Questions?
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Additional Resources
36
www.trustarc.com/resources
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Contacts
Charles Nwasor charles.nwasor@ensono.com
Paul Iagnocco piagnocco@trustarc.com
Margaret Alston malston@trustarc.com
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Privacy Insight Series – 2017 Calendar
38
www.trustarc.com/insightseries
PRIVACY INSIGHT SERIES
Summer / Fall 2017 Webinar Program
© 2017 TrustArc Inc Proprietary and Confidential Information
Thank You!
Register for the next webinar in our Series – September 12th
“Building an integrated PIA/DPIA Program:
Case Studies from the Field”
For full Summer/Fall schedule and past webinar recordings
visit: http://www.trustarc.com/insightseries
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Executive
Team
manager
Individual
contributor
Job Level
1%
2%
2%
2%
2%
2%
3%
3%
3%
3%
4%
5%
5%
6%
8%
11%
17%
22%
0% 5% 10% 15% 20% 25%
Non-Profit
Food and Beverage
Hospitality and Entertainment
Aerospace and Defense
Media
Other
Internet and E-commerce
Transportation
Consumer Products
Healthcare and Pharmaceutical
Telecommunications
Energy and Utilities
Retail
Education
Business Services
Manufacturing
Technology
Financial and Insurance Services
Industry
Respondent Demographics
40
Company Size (# employees)
TrustArc / Dimensional Research 2017
29%
34%
14%
10%
13%
500 - 1,000 1,000 - 5,000
5,000 - 10,000 10,000 - 50,000
More than 50,000
14%
39%
47%
© 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Privacy and the EU GDPR:
2017 Survey of Privacy Professionals
Research Overview
• Conducted May 10 - 17, 2017 by Dimensional Research
• Respondents US based privacy professionals from companies who subject to
GDPR
• Minimum company size = 500 employees
• Respondent company headquarters: 92% US or Canada; 5% EU, 3% other
• Respondents work in legal, IT, compliance and privacy functions
• For 36% surveyed, privacy was their entire job
• For 64% surveyed, privacy was an important part of their job (over 25%)
• Note – due to rounding, some totals will not sum to exactly 100%
41

More Related Content

What's hot

Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
Nada G.Youssef
 
ISO 27701
ISO 27701ISO 27701
ISO 27701
UtkarshDhiman4
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
Haris Chughtai
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
IT Governance Ltd
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
Tanmay Shinde
 
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
TrustArc
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
Amiit Keshav Naik
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Eryk Budi Pratama
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
OpenAIRE
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance
TrustArc
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
Eryk Budi Pratama
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
Dinesh O Bareja
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
Business Beam
 
Security & Privacy of Information Technology
Security & Privacy of Information TechnologySecurity & Privacy of Information Technology
Security & Privacy of Information Technology
Ashish Mathew
 
GDPR training
GDPR training GDPR training
GDPR training
ASL
 
GDPR
GDPRGDPR
GDPR
Gopi PD
 

What's hot (20)

Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
ISO 27701
ISO 27701ISO 27701
ISO 27701
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Security & Privacy of Information Technology
Security & Privacy of Information TechnologySecurity & Privacy of Information Technology
Security & Privacy of Information Technology
 
GDPR training
GDPR training GDPR training
GDPR training
 
GDPR
GDPRGDPR
GDPR
 

Similar to Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your Data Inventory [TrustArc Webinar Slides]

Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
TrustArc
 
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
TrustArc
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
Ulf Mattsson
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR Compliance
MarketingArrowECS_CZ
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Veritas Technologies LLC
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
IT Governance Ltd
 
3 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-23 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-2
Redazione InnovaPuglia
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
Splunk
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
IT Governance Ltd
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Ulf Mattsson
 
What you will take away from this session
What you will take away from this sessionWhat you will take away from this session
What you will take away from this session
Digital Transformation EXPO Event Series
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
 
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
Mailjet
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
IBM Security
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
Google
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
Financial Poise
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
Vuzion
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR Compliance
DATAVERSITY
 

Similar to Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your Data Inventory [TrustArc Webinar Slides] (20)

Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
 
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR Compliance
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
3 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-23 oraclex evento reg puglia_v2017-09-14-2
3 oraclex evento reg puglia_v2017-09-14-2
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
What you will take away from this session
What you will take away from this sessionWhat you will take away from this session
What you will take away from this session
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR Compliance
 

More from TrustArc

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
TrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
TrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
TrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
TrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
TrustArc
 

More from TrustArc (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 

Recently uploaded

Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
shweeta209
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
patrons legal
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
OmGod1
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
OmGod1
 

Recently uploaded (20)

Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 

Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your Data Inventory [TrustArc Webinar Slides]

  • 1. © 2017 TrustArc Inc Proprietary and Confidential Information PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program PRIVACY INSIGHT SERIES Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on Your Data Inventory August 16, 2017
  • 2. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Thank you for joining the webinar • We will start 2-3 minutes after the hour • This webinar will be recorded – both the recording and slides will be sent out via email later today • Please use the GotoWebinar Control Panel on the right hand side to submit any questions for the speakers 2 “Mastering Article 30 Compliance: Conducting, Maintaining and Reporting on your Data Inventory”
  • 3. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Today’s Speakers Charles Nwasor Director, Global Assurance & Advisory Ensono Paul Iagnocco Senior Privacy Consultant TrustArc Margaret Alston, CIPP/G/C/M Consulting Program Director TrustArc Eleanor Treharne-Jones VP Sales & Consulting TrustArc 3
  • 4. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries The EU GDPR – May 25, 2018 Deadline Significant Compliance Requirements 4
  • 5. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Help is Needed Across Wide Range of Areas 78% of Companies looking for help with Data Inventory & Mapping Question: “Below is a list of tasks related to data privacy compliance. For each task please indicate the amount of additional help you will need to accomplish these tasks in 2017.” 22% 22% 23% 23% 25% 25% 25% 26% 30% 36% 39% 41% 53% 51% 53% 57% 52% 53% 57% 49% 45% 46% 38% 25% 26% 23% 18% 23% 21% 17% 21% 19% 15% 0% 20% 40% 60% 80% 100% Obtaining and managing user consent Creating a vendor risk management program Managing privacy complaints and individual rights Managing privacy incidents and breach notification Implementing privacy by design / privacy engineering Data de-identification / anonymization Creating data inventory and maps Conducting privacy risk assessments, PIAs, DPIAs Meeting regulatory reporting requirements Addressing international data transfer (Privacy Shield, APEC CBPR, BCRs, etc.) Developing a GDPR privacy plan Need significant help Need some help Don't need help TrustArc / Dimensional Research 2017 5
  • 6. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Today’s Agenda • What’s Required Under Article 30 of the GDPR? • Tools & Methodologies • Getting Internal Buy-in • Scoping and Prioritization • Addressing Third Parties • What is a Data Map? • You’ve completed a Data Inventory Mapping Exercise – What’s Next? 6
  • 7. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Poll Question Have you completed a data inventory yet? 4% TrustArc / Dimensional Research 2017 A. We haven’t started B. We have an existing inventory that we’re looking to update C. We have allocated resources (people/technology) to complete this D. We are in the process of completing our inventory E. We have a completed data inventory 7
  • 8. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information What’s required under Article 30 of the GDPR?
  • 9. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries GDPR Article 30 – What’s Actually Required? Art. 30 GDPR = Records of Processing Activities – Each controller and, where applicable, the controller's representative, shall maintain a record of processing activities under its responsibility. – Each processor and, where applicable, the processor's representative shall maintain a record of all categories of processing activities carried out on behalf of a controller – The records shall be in writing, including in electronic form. – The controller or the processor and, where applicable, the controller's or the processor's representative, shall make the record available to the supervisory authority on request. – The obligations shall not apply to an enterprise or an organisation employing fewer than 250 persons unless the processing it carries out is likely to result in a risk to the rights and freedoms of data subjects, the processing is not occasional, or the processing includes special categories of data as referred to in Article 9(1) or personal data relating to criminal convictions and offences referred to in Article 10. 9
  • 10. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries What’s Actually Required? • Applies equally to controllers and processors • What’s meant by a “record”? • Available on demand following request from a regulator • No explicit requirement for data mapping • Certain exemptions for SMEs 10
  • 11. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Records of Processing Activities for Controllers Each controller and, where applicable, the controller's representative, shall maintain a record of processing activities under its responsibility. That record shall contain all of the following information: • the name and contact details of the controller and, where applicable, the joint controller, the controller's representative and the data protection officer; • the purposes of the processing; • a description of the categories of data subjects and of the categories of personal data; • the categories of recipients to whom the personal data have been or will be disclosed including recipients in third countries or international organisations; • where applicable, transfers of personal data to a third country or an international organisation, including the identification of that third country or international organisation and, in the case of transfers referred to in the second subparagraph of Article 49(1), the documentation of suitable safeguards; • where possible, the envisaged time limits for erasure of the different categories of data; • where possible, a general description of the technical and organisational security measures referred to in Article 32(1). 11
  • 12. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Records of Processing Activities for Processors Each processor and, where applicable, the processor's representative shall maintain a record of all categories of processing activities carried out on behalf of a controller, containing: • the name and contact details of the processor or processors and of each controller on behalf of which the processor is acting, and, where applicable, of the controller's or the processor's representative, and the data protection officer; • the categories of processing carried out on behalf of each controller; • where applicable, transfers of personal data to a third country or an international organisation, including the identification of that third country or international organisation and, in the case of transfers referred to in the second subparagraph of Article 49(1), the documentation of suitable safeguards; • where possible, a general description of the technical and organisational security measures referred to in Article 32(1). 12
  • 13. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Approach, Methodology & Tools
  • 14. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Systems vs Business Process Inventory IT/Systems Based Approach “Show me all the systems and applications being used to process or store our data.” Process Based Approach “Show me all of our business processes that contain personal information.” 14
  • 15. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Systems vs Business Process Inventory IT/Systems Based Approach: “Show me all the systems and applications being used to process or store our data” Database HR data Payroll data Employee data Customer data Platform/ UI SFDC ADP Oracle Gmail HR Manager US HR Manager UK Employee CFO 15
  • 16. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Systems vs Business Process Inventory Process Based Approach: “Show me all of our business processes that contain personal information” Employee ADP Gmail HR Manager UK HR Manager US 16
  • 17. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Sample Business Process Documentation 17
  • 18. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Poll Question What approach have you taken to your data inventory? 4% 18 TrustArc / Dimensional Research 2017 A. Business Process inventory B. Asset/systems inventory C. Not yet started a data inventory 18
  • 19. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Methodology & Tools Discovery Process • Questionnaires • Interviews • Automated Scanning • Automated Feeds/Uploads Ongoing maintenance • Spreadsheets • Data Inventory & Mapping Tools 19
  • 20. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Sample Data Inventory Spreadsheets 20
  • 21. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Sample Business Process Mapping 21
  • 22. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Getting Internal Buy-In
  • 23. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Getting Buy-In Business Unit Engagement Focus Benefits to BU & Business Information Technology identifying storage redundancies • Reduce infrastructure complexity • Cost savings Information Security understanding what data reside in which systems • Prioritize protection efforts – focus on high risk, high value • Establish appropriate access controls • Cost savings Operations visualizing flows and uses of data throughout the company • Reduce redundancies • Improve efficiencies • Cost savings Procurement identifying points at which the company shares information with third party vendors and understanding the sensitivity of the data being shared • Support risk-based vendor management • Greater efficiency in contract management • Cost savings 23
  • 24. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Scoping & Prioritization
  • 25. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Knowing where to start… • Identify any previous inventories or documentation within the business that you can leverage – examples include: – asset inventory (typically held by IT) – vendor lists • Start by identifying the people you want to speak to (key stakeholders) within each of your business units and use these numbers to start to build approximate numbers and details of business processes in scope • Consider starting with a pilot project with one business unit to test and validate your methodology and use early deliverables to secure better engagement for the broader project 25
  • 26. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Addressing Third Parties
  • 27. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Addressing Third Parties • Need to know which third party vendors are either in the EU or that may handle EU personal data • Make an inventory, then classify the vendors • Develop customized policy and procedures for initial vendor vetting, on-going reviews and audits, and end-of-relationship activities 27
  • 28. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Poll Question What are the main obstacles that you have encountered? 4% 28 TrustArc / Dimensional Research 2017 A. Lack of budget B. Lack of engagement C. Managing alongside business priorities D. Scoping E. Tools to manage on an ongoing basis
  • 29. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information What’s a Data Map?
  • 30. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Data Mapping • The GDPR doesn’t actually require data maps rather a “record of processing activities” • However it is hard to capture the multi-linear connections between different data flows and assets without some form of visualization • Data visualizations or “maps” help companies to understand the data they hold and build in controls to manage any inherent risk • Many different approaches exist – common tools include Visio and LucidChart 30
  • 31. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Data Mapping – TrustArc Today 31
  • 32. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Data Mapping – TrustArc Tomorrow 32
  • 33. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information You’ve Completed a Data Inventory & Mapping Exercise – What’s Next?
  • 34. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries What’s Next? • Identifying Tools and Methodologies to Scale and Maintain the Data Inventory • Developing Article 30 Compliance Reporting • Using as foundation for ongoing GDPR Compliance Program • Identifying Inherent Risk and Completing DPIAs as required under Article 35 • Ongoing Training on Inventory Change Management • Share with Cross-functional Teams for broader organizational benefit 34
  • 35. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Questions?
  • 36. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Additional Resources 36 www.trustarc.com/resources
  • 37. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Contacts Charles Nwasor charles.nwasor@ensono.com Paul Iagnocco piagnocco@trustarc.com Margaret Alston malston@trustarc.com
  • 38. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Privacy Insight Series – 2017 Calendar 38 www.trustarc.com/insightseries
  • 39. PRIVACY INSIGHT SERIES Summer / Fall 2017 Webinar Program © 2017 TrustArc Inc Proprietary and Confidential Information Thank You! Register for the next webinar in our Series – September 12th “Building an integrated PIA/DPIA Program: Case Studies from the Field” For full Summer/Fall schedule and past webinar recordings visit: http://www.trustarc.com/insightseries
  • 40. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Executive Team manager Individual contributor Job Level 1% 2% 2% 2% 2% 2% 3% 3% 3% 3% 4% 5% 5% 6% 8% 11% 17% 22% 0% 5% 10% 15% 20% 25% Non-Profit Food and Beverage Hospitality and Entertainment Aerospace and Defense Media Other Internet and E-commerce Transportation Consumer Products Healthcare and Pharmaceutical Telecommunications Energy and Utilities Retail Education Business Services Manufacturing Technology Financial and Insurance Services Industry Respondent Demographics 40 Company Size (# employees) TrustArc / Dimensional Research 2017 29% 34% 14% 10% 13% 500 - 1,000 1,000 - 5,000 5,000 - 10,000 10,000 - 50,000 More than 50,000 14% 39% 47%
  • 41. © 2017 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Privacy and the EU GDPR: 2017 Survey of Privacy Professionals Research Overview • Conducted May 10 - 17, 2017 by Dimensional Research • Respondents US based privacy professionals from companies who subject to GDPR • Minimum company size = 500 employees • Respondent company headquarters: 92% US or Canada; 5% EU, 3% other • Respondents work in legal, IT, compliance and privacy functions • For 36% surveyed, privacy was their entire job • For 64% surveyed, privacy was an important part of their job (over 25%) • Note – due to rounding, some totals will not sum to exactly 100% 41