SlideShare a Scribd company logo
MRS Operations Network:
GDPR – Organisational Measures
May 2018
Debrah Harding
MRS, Managing Director
Session Topics
Supplier Selection and procurement
Contracts – new and existing suppliers
Data Protection Impact Assessments
Breach reporting
Supplier Selection &
Procurement
GDPR requires you to demonstrate compliance and to have in place
appropriate technical and organisational measures to meet the
requirements of accountability…
Existing Suppliers:
 Review suppliers’ arrangements to determine if these are adequate for
your purposes
 Undertake checks and/or audits to ensure assurances are matched with
reality
New suppliers
 Include GDPR arrangements as part of your selection criteria
 When choosing new suppliers ask for evidence of GDPR adherence e.g.
policies, procedures, training arrangements, further sub-contraction, etc
Contracts – new
and existing
suppliers
Contracts
GDPR requires contracts with processors or between data controllers:
 Written contracts with processors must include terms to:
 Only act on written instructions of DC
 Ensure people processing subject to duty of confidence
 Appropriate security measures
 Assist DC in providing subject access and allowing data subjects to exercise rights
 Assist DC in meeting obligations regarding security; data breach notification; DPIA’s
 Delete or return all personal data to controller as requested at end of contract
 Submit to audit/inspection and ensure meeting obligations by notifying DC
 Agreements with joint data controller should address:
 Research parameters e.g. outputs and standard for delivery of anonymised data;
Re-contact consents
 Liabilities, assurances and indemnities
 Allocation of responsibilities on data subject requests, applicable privacy policies
Contracts
GDPR action points for supplier contracts:
Existing Suppliers:
 Review existing contracts
 Issue new contracts or agree contract ‘addendum’ replacing old data
protection requirements with GDPR
New suppliers
 Create new GDPR contracts
 Consider transfer clauses – any outside of the EEA?
 Transfers outside EEA must have adequate safeguards
Data Protection
Impact
Assessments
DPIA: Tool for risk-
based demonstrable
compliance
Organisations must fully consider the risks that processing poses to the
fundamental rights and freedoms of individuals
What does this mean?
 Identify risky processing activities
 Consider implications of the risk level
 Mitigate any risks
DPIAs particularly relevant when a new data processing process, new
suppliers, system or technology is being introduced
Failure to conduct when required is Tier 2 Breach
When is a DPIA
required?
Processing “likely to result in a high risk to the rights and freedoms of
natural persons”:
 Systematic and extensive profiling, with significant effects
(GDPR)
 Large scale processing on a large scale of special categories of
data or criminal convictions data (GDPR)
 Systematic monitoring of a publicly accessible area on a large
scale (GDPR)
 New technologies (ICO)
 Large scale profiling or profiling of children (ICO)
 Matching datasets or combining datasets from different sources
(ICO)
 Invisible processing (ICO)
 Tracking location or behaviour (ICO)
Who should be
involved?
 Data Controller – is it the client or research supplier or both?
 If Joint it is reasonable to have a ‘lead’ which takes
responsibility for DPIAs and other responsibilities
 People with appropriate expertise and knowledge of a project
(internal and/or external)
 Designated Data Protection Officer (DPO)
How to conduct a DPIA?
1. Identify need
for DPIA
2. Describe the
processing
3. Consider
consultation
4. Assess
necessity and
proportionality
5. Identify and
assess risks
(likelihood,
impact/severity)
6. Identify
measures to and
mitigate risk
7. Sign off and
record outcomes
8. Integrate PIA
outcomes back
into the project
plan
9. Keep under
review
ICO (2018) Draft DPIA Consultation
DPIA Checklist
 Have staff been trained to consider DPIA at early point
and on how to carry it out?
 Is DPIA included in policies, processes and procedures?
 Do you understand the type of processing that requires
DPIA?
 Have you created and documented DPIA process
(including approach where no DPIA required)?
 Do you ensure mitigation measures implemented?
 Are you aware when the ICO needs to be consulted?
Breach
Reporting
Personal data breach
notifications
If you are made aware of a personal
data breach
Is the breach a risk to individuals? If
yes tell supervisory authority (if no
then document personal data breach)
Is breach “high risk”? If yes tell
affected individuals (if no end of
process)
Data security breach
notification process
• Response to incident should
include a recovery plan
• Procedures for damage limitation1.Containment
and recovery
• Assess risks as these affect what you
do once the breach has been contained
• Consider potential adverse
consequences for individuals (severity
and likelihood of risk)
2.Assessing
the Risks
Data security breach
notification process
• Establish process for notification to
ICO, individual and controller
3.Notification
• Investigate causes and evaluate
effectiveness of response to it
• Build in effective ways of detecting
breaches
• If necessary, then update your policies
and procedures accordingly
4. Evaluation
and
Response
MRS guidance &
awareness
Guidance
•MRS EFAMRO ESOMAR Guidance Note on Research Sector – Legal Bases
(June 2017)
•GDPR In Brief – 7 GDPR topics covered to date
•Data Protection & Research: Guidance for MRS members (April 2018)
•Fair Data, Impact, MRS Blogs and Articles
Live and Recorded Webinars
•GDPR Countdown (May 2017)
•MRS AURA Client Side Research (November 2017)
•Off the Starting Blocks (March 2018)
•RAS GDPR (May 2018)
•GDPR & Analytics (June 2018)
Training and Events
•MRS Roadshow (Leeds, Bristol, Edinburgh, Birmingham, London March to
July 2018)
•Association events e.g. EphMra; Cvent; MRG; EMA;
•MRS GDPR and Data Privacy in Research Training (May 2018)
•Company Partner Briefings (Ongoing)
MRS Operations
Network
• The Network is open to any who works in operations in any capacity, please
email Company.Partners@mrs.org.uk stating your company name and job title to join.
• We will be tweeting about this event using the hashtag #CPSops
• The next event will be the “Oppies” on 13 September. The Deadline for entering is
03.05.2018
• Post-event feedback
MRS is trialling an online feedback facility for events. A link will be sent to you after
the event.
Thank you
Any questions?

More Related Content

What's hot

EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
RAKESH S
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
HackerOne
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
Zoodikers
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratg
Cyber StratG
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
GDPR 12 Steps infographic
GDPR 12 Steps infographic GDPR 12 Steps infographic
GDPR 12 Steps infographic
Ermine Amies
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
DAMA Ireland
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPR
Gary Chambers
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
Jessvin Thomas
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
MRS
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection framework
Leigh Hill
 
Data breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processorsData breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processors
Exove
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
Microsoft Österreich
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Chris Doolittle
 
Understanding gdpr compliance gdpr analytics tools
Understanding gdpr compliance  gdpr analytics toolsUnderstanding gdpr compliance  gdpr analytics tools
Understanding gdpr compliance gdpr analytics tools
RominaMariaBaltariu
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
Paul O'Carroll
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...
Exove
 
Do You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? ArticleDo You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? Article
Ulf Mattsson
 

What's hot (20)

EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratg
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR 12 Steps infographic
GDPR 12 Steps infographic GDPR 12 Steps infographic
GDPR 12 Steps infographic
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPR
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection framework
 
Data breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processorsData breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processors
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
 
Understanding gdpr compliance gdpr analytics tools
Understanding gdpr compliance  gdpr analytics toolsUnderstanding gdpr compliance  gdpr analytics tools
Understanding gdpr compliance gdpr analytics tools
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...
 
Do You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? ArticleDo You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? Article
 

Similar to MRS Operations Network: GDPR - Organisational Measures

Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
IAB Europe's GDPR Compliance Primer
IAB Europe's GDPR Compliance PrimerIAB Europe's GDPR Compliance Primer
IAB Europe's GDPR Compliance Primer
IAB Europe
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
Peter Witsenburg
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...
Infinity Legal Solutions
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
Dimitri Sirota
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?
Infinity Legal Solutions
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
accenture
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
Capgemini
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
ARMA International
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
Alberto Canadè
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
Cobweb
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
Vuzion
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
Ogilvy Consulting
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Qualsys Ltd
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
Gabor Farkas
 
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
Mailjet
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
Capgemini
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
TrustArc
 
Using GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceUsing GDPR to Transform Customer Experience
Using GDPR to Transform Customer Experience
MongoDB
 

Similar to MRS Operations Network: GDPR - Organisational Measures (20)

Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
IAB Europe's GDPR Compliance Primer
IAB Europe's GDPR Compliance PrimerIAB Europe's GDPR Compliance Primer
IAB Europe's GDPR Compliance Primer
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
How to Work With 3rd Party Software Providers Under GDPR - A Digital Marketin...
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
Using GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceUsing GDPR to Transform Customer Experience
Using GDPR to Transform Customer Experience
 

More from MRS

Covid 19 research - wave 2
Covid 19 research - wave 2 Covid 19 research - wave 2
Covid 19 research - wave 2
MRS
 
Respondi whitepaper the 'appiness project
Respondi whitepaper the 'appiness projectRespondi whitepaper the 'appiness project
Respondi whitepaper the 'appiness project
MRS
 
Supporting good Mental Health at Work
Supporting good Mental Health at Work Supporting good Mental Health at Work
Supporting good Mental Health at Work
MRS
 
MRS Speaker Evening- hosted by the ADA Network
MRS Speaker Evening- hosted by the ADA NetworkMRS Speaker Evening- hosted by the ADA Network
MRS Speaker Evening- hosted by the ADA Network
MRS
 
Big Semiotics - May 2019
Big Semiotics - May 2019Big Semiotics - May 2019
Big Semiotics - May 2019
MRS
 
Digital Darwinism: How online communities can survive and thrive three waves ...
Digital Darwinism: How online communities can survive and thrive three waves ...Digital Darwinism: How online communities can survive and thrive three waves ...
Digital Darwinism: How online communities can survive and thrive three waves ...
MRS
 
How to write an Oppies Award Entry
How to write an Oppies Award EntryHow to write an Oppies Award Entry
How to write an Oppies Award Entry
MRS
 
MRS Roadshow 2019
MRS Roadshow 2019MRS Roadshow 2019
MRS Roadshow 2019
MRS
 
BBC Media Action - 2019
BBC Media Action - 2019BBC Media Action - 2019
BBC Media Action - 2019
MRS
 
Using VR for immersion and audience engagement
Using VR for immersion and audience engagementUsing VR for immersion and audience engagement
Using VR for immersion and audience engagement
MRS
 
Humans v tech
Humans v tech Humans v tech
Humans v tech
MRS
 
Planning for new communities
Planning for new communitiesPlanning for new communities
Planning for new communities
MRS
 
Women in Ads
Women in AdsWomen in Ads
Women in Ads
MRS
 
Grooming and well-being
Grooming and well-beingGrooming and well-being
Grooming and well-being
MRS
 
Leveragin research, behavioural and demeographic data
Leveragin research, behavioural and demeographic dataLeveragin research, behavioural and demeographic data
Leveragin research, behavioural and demeographic data
MRS
 
MRS ADAN Symposium Multiple Source Analytics
MRS ADAN Symposium Multiple Source AnalyticsMRS ADAN Symposium Multiple Source Analytics
MRS ADAN Symposium Multiple Source Analytics
MRS
 
BBC radio 4 semiotics for MRS
BBC radio 4 semiotics for MRSBBC radio 4 semiotics for MRS
BBC radio 4 semiotics for MRS
MRS
 
Skin Deep: GSR
Skin Deep: GSRSkin Deep: GSR
Skin Deep: GSR
MRS
 
Sensodyne - Think Global. Advertise Local.
Sensodyne - Think Global. Advertise Local.Sensodyne - Think Global. Advertise Local.
Sensodyne - Think Global. Advertise Local.
MRS
 
The Dropout Challenge
The Dropout ChallengeThe Dropout Challenge
The Dropout Challenge
MRS
 

More from MRS (20)

Covid 19 research - wave 2
Covid 19 research - wave 2 Covid 19 research - wave 2
Covid 19 research - wave 2
 
Respondi whitepaper the 'appiness project
Respondi whitepaper the 'appiness projectRespondi whitepaper the 'appiness project
Respondi whitepaper the 'appiness project
 
Supporting good Mental Health at Work
Supporting good Mental Health at Work Supporting good Mental Health at Work
Supporting good Mental Health at Work
 
MRS Speaker Evening- hosted by the ADA Network
MRS Speaker Evening- hosted by the ADA NetworkMRS Speaker Evening- hosted by the ADA Network
MRS Speaker Evening- hosted by the ADA Network
 
Big Semiotics - May 2019
Big Semiotics - May 2019Big Semiotics - May 2019
Big Semiotics - May 2019
 
Digital Darwinism: How online communities can survive and thrive three waves ...
Digital Darwinism: How online communities can survive and thrive three waves ...Digital Darwinism: How online communities can survive and thrive three waves ...
Digital Darwinism: How online communities can survive and thrive three waves ...
 
How to write an Oppies Award Entry
How to write an Oppies Award EntryHow to write an Oppies Award Entry
How to write an Oppies Award Entry
 
MRS Roadshow 2019
MRS Roadshow 2019MRS Roadshow 2019
MRS Roadshow 2019
 
BBC Media Action - 2019
BBC Media Action - 2019BBC Media Action - 2019
BBC Media Action - 2019
 
Using VR for immersion and audience engagement
Using VR for immersion and audience engagementUsing VR for immersion and audience engagement
Using VR for immersion and audience engagement
 
Humans v tech
Humans v tech Humans v tech
Humans v tech
 
Planning for new communities
Planning for new communitiesPlanning for new communities
Planning for new communities
 
Women in Ads
Women in AdsWomen in Ads
Women in Ads
 
Grooming and well-being
Grooming and well-beingGrooming and well-being
Grooming and well-being
 
Leveragin research, behavioural and demeographic data
Leveragin research, behavioural and demeographic dataLeveragin research, behavioural and demeographic data
Leveragin research, behavioural and demeographic data
 
MRS ADAN Symposium Multiple Source Analytics
MRS ADAN Symposium Multiple Source AnalyticsMRS ADAN Symposium Multiple Source Analytics
MRS ADAN Symposium Multiple Source Analytics
 
BBC radio 4 semiotics for MRS
BBC radio 4 semiotics for MRSBBC radio 4 semiotics for MRS
BBC radio 4 semiotics for MRS
 
Skin Deep: GSR
Skin Deep: GSRSkin Deep: GSR
Skin Deep: GSR
 
Sensodyne - Think Global. Advertise Local.
Sensodyne - Think Global. Advertise Local.Sensodyne - Think Global. Advertise Local.
Sensodyne - Think Global. Advertise Local.
 
The Dropout Challenge
The Dropout ChallengeThe Dropout Challenge
The Dropout Challenge
 

Recently uploaded

Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 

Recently uploaded (20)

Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 

MRS Operations Network: GDPR - Organisational Measures

  • 1. MRS Operations Network: GDPR – Organisational Measures May 2018 Debrah Harding MRS, Managing Director
  • 2. Session Topics Supplier Selection and procurement Contracts – new and existing suppliers Data Protection Impact Assessments Breach reporting
  • 3. Supplier Selection & Procurement GDPR requires you to demonstrate compliance and to have in place appropriate technical and organisational measures to meet the requirements of accountability… Existing Suppliers:  Review suppliers’ arrangements to determine if these are adequate for your purposes  Undertake checks and/or audits to ensure assurances are matched with reality New suppliers  Include GDPR arrangements as part of your selection criteria  When choosing new suppliers ask for evidence of GDPR adherence e.g. policies, procedures, training arrangements, further sub-contraction, etc
  • 4. Contracts – new and existing suppliers
  • 5. Contracts GDPR requires contracts with processors or between data controllers:  Written contracts with processors must include terms to:  Only act on written instructions of DC  Ensure people processing subject to duty of confidence  Appropriate security measures  Assist DC in providing subject access and allowing data subjects to exercise rights  Assist DC in meeting obligations regarding security; data breach notification; DPIA’s  Delete or return all personal data to controller as requested at end of contract  Submit to audit/inspection and ensure meeting obligations by notifying DC  Agreements with joint data controller should address:  Research parameters e.g. outputs and standard for delivery of anonymised data; Re-contact consents  Liabilities, assurances and indemnities  Allocation of responsibilities on data subject requests, applicable privacy policies
  • 6. Contracts GDPR action points for supplier contracts: Existing Suppliers:  Review existing contracts  Issue new contracts or agree contract ‘addendum’ replacing old data protection requirements with GDPR New suppliers  Create new GDPR contracts  Consider transfer clauses – any outside of the EEA?  Transfers outside EEA must have adequate safeguards
  • 8. DPIA: Tool for risk- based demonstrable compliance Organisations must fully consider the risks that processing poses to the fundamental rights and freedoms of individuals What does this mean?  Identify risky processing activities  Consider implications of the risk level  Mitigate any risks DPIAs particularly relevant when a new data processing process, new suppliers, system or technology is being introduced Failure to conduct when required is Tier 2 Breach
  • 9. When is a DPIA required? Processing “likely to result in a high risk to the rights and freedoms of natural persons”:  Systematic and extensive profiling, with significant effects (GDPR)  Large scale processing on a large scale of special categories of data or criminal convictions data (GDPR)  Systematic monitoring of a publicly accessible area on a large scale (GDPR)  New technologies (ICO)  Large scale profiling or profiling of children (ICO)  Matching datasets or combining datasets from different sources (ICO)  Invisible processing (ICO)  Tracking location or behaviour (ICO)
  • 10. Who should be involved?  Data Controller – is it the client or research supplier or both?  If Joint it is reasonable to have a ‘lead’ which takes responsibility for DPIAs and other responsibilities  People with appropriate expertise and knowledge of a project (internal and/or external)  Designated Data Protection Officer (DPO)
  • 11. How to conduct a DPIA? 1. Identify need for DPIA 2. Describe the processing 3. Consider consultation 4. Assess necessity and proportionality 5. Identify and assess risks (likelihood, impact/severity) 6. Identify measures to and mitigate risk 7. Sign off and record outcomes 8. Integrate PIA outcomes back into the project plan 9. Keep under review ICO (2018) Draft DPIA Consultation
  • 12. DPIA Checklist  Have staff been trained to consider DPIA at early point and on how to carry it out?  Is DPIA included in policies, processes and procedures?  Do you understand the type of processing that requires DPIA?  Have you created and documented DPIA process (including approach where no DPIA required)?  Do you ensure mitigation measures implemented?  Are you aware when the ICO needs to be consulted?
  • 14. Personal data breach notifications If you are made aware of a personal data breach Is the breach a risk to individuals? If yes tell supervisory authority (if no then document personal data breach) Is breach “high risk”? If yes tell affected individuals (if no end of process)
  • 15. Data security breach notification process • Response to incident should include a recovery plan • Procedures for damage limitation1.Containment and recovery • Assess risks as these affect what you do once the breach has been contained • Consider potential adverse consequences for individuals (severity and likelihood of risk) 2.Assessing the Risks
  • 16. Data security breach notification process • Establish process for notification to ICO, individual and controller 3.Notification • Investigate causes and evaluate effectiveness of response to it • Build in effective ways of detecting breaches • If necessary, then update your policies and procedures accordingly 4. Evaluation and Response
  • 17. MRS guidance & awareness Guidance •MRS EFAMRO ESOMAR Guidance Note on Research Sector – Legal Bases (June 2017) •GDPR In Brief – 7 GDPR topics covered to date •Data Protection & Research: Guidance for MRS members (April 2018) •Fair Data, Impact, MRS Blogs and Articles Live and Recorded Webinars •GDPR Countdown (May 2017) •MRS AURA Client Side Research (November 2017) •Off the Starting Blocks (March 2018) •RAS GDPR (May 2018) •GDPR & Analytics (June 2018) Training and Events •MRS Roadshow (Leeds, Bristol, Edinburgh, Birmingham, London March to July 2018) •Association events e.g. EphMra; Cvent; MRG; EMA; •MRS GDPR and Data Privacy in Research Training (May 2018) •Company Partner Briefings (Ongoing)
  • 18. MRS Operations Network • The Network is open to any who works in operations in any capacity, please email Company.Partners@mrs.org.uk stating your company name and job title to join. • We will be tweeting about this event using the hashtag #CPSops • The next event will be the “Oppies” on 13 September. The Deadline for entering is 03.05.2018 • Post-event feedback MRS is trialling an online feedback facility for events. A link will be sent to you after the event.

Editor's Notes

  1. Overview GDPR Impact on organisations and sector Steps MRS taking to assist implementation in the sector
  2. 1.  What level of liability cap do you really need?  While we all know that the DPAs can, in theory, fine up to 4% annual worldwide turnover, the likelihood of them doing so is very slim and that level of fine would only be seen in the most egregious data protection breaches.  That risk can also to a large degree be managed by the controller by going through a thorough due diligence process, selecting a reputable supplier, and instructing that supplier to engage only in lawful processing activities.  Higher value liability caps are likely only to be needed where the data, or the processing operations, are of a particularly sensitive nature.  Suppliers are very unlikely to agree to significant liability caps in the majority of cases, so agree instead on a level of liability that represents a realistic reflection of the ‘riskiness’ of the processing. 2.  What level of insurance do you have in place?  If you’re a supplier, time to dust off those cybersecurity insurance policies and check them out - or go and get one if you haven’t already.  Don’t look at just the value of the insurance you have in place, but consider too its scope - does it protect only against security incidents or does it extend to wider data protection regulatory breaches?  Does it insure you against contractual claims?  Are you insured on a ‘per claim’ or ‘all claims’ basis?  If the policy was taken out before GDPR, does it need re-brokering in light of GDPR risks?  Ultimately, as a supplier, you don’t want to expose your business to significant risks for which you may not have adequate insurance coverage.  Equally, as a customer, there’s no point having enormous contractual liability coverage from your supplier only to find it is uninsured and will be bankrupted - and so unable to pay you - the first time you make a claim. 3.  What are the liability triggers?  Another important consideration is what triggers must exist for a customer to make a contractual claim against its processor for a data protection breach.  If those triggers are carefully managed, a supplier may be prepared to agree to higher liability if it is not having to constantly look over its shoulder for every minor mishap.  For example, if a customer requires prior consent every time a supplier wants to appoint a new subprocessor, the supplier may be reluctant to agree to a significant liability cap for fear that a simple failure to notify its customer about a new subprocessor may expose it to contractual liability.  Conversely, if the supplier is given a general consent to engage subprocessors, it may accept a little more liability risk.  Similarly, if there is a good dispute resolution clause in the agreement, then suppliers may feel better able to manage and resolve contractual complaints without fear that a customer will turn immediately to litigation - again encouraging it to accept a greater liability cap.  4.  You don’t have to ask for, or give, indemnities.  It’s very common for many data processing agreements these days to include indemnities, and the scope of some of these indemnities can be very wide indeed.  An indemnity is essentially a contractual right to financial recovery on the occurrence of certain trigger events (so see point 3 above!), and recovery under an indemnity can be significantly greater than recovery under court-awarded damages.  It’s very common to see wide-ranging indemnities in US contracts, but their use is far less common in European contracts.  For that reason, if you’re a supplier, you might want to think about taking data protection indemnities out of your standard terms and offer them only as a fallback in negotiations; equally, as a customer, remember that you don’t need an indemnity to recover damages from your supplier and so removing an indemnity could be a lever for agreeing a higher liability cap. 5.  What is the market standard?  “What does everyone else do?” It’s a question that lawyers are asked so often.  “I don’t want to offer any more liability than anyone else.”  The truth is, right now, we don’t really know.  Because the GDPR has not yet come into force, market practice around liability caps hasn’t yet arisen - but, rest assured, it will do, and 18 - 24 months from now, what is a ‘standard’ liability cap offering will be much clearer.  Keep a watching brief on what your competitors are doing, and speak to peers whenever you can. 6.  Context is king!  There are so many other relevant considerations to take into account that it’s hard to enumerate them here.  But consider too things like the life of the contract (easier to justify a higher cap for a long term contract than a short term contract), contract price (remembering that services are typically priced on a certain assumption of liability - and if liability goes up so too does price), and the degree of reciprocity in the contract (if you insist on unlimited liability from your processor, just remember it may well turn around and insist on unlimited liability from you too!)
  3. Although the concept of risk runs throughout the GDPR it is not specifically defined. Some examples cited in the Regulation, that are more likely to result in a high risk include: systematic automated profiling large scale monitoring of sensitive data systematic monitoring of a publicly accessible area on large scale Risk needs to be determined in the specific context of your own operations and there is no “one-size fits all” list. However consider in particular how you engage in activities: Processing sensitive data (ethnicity, political or religious beliefs and health, genetic or biometric data) involving vulnerable individuals or children processing personal data on a large scale automated profiling individuals likelihood and severity” of any negative impact of your processing activities on individuals by reference to the nature, scope, context and purpose of processing. For example a vulnerable individual may be particularly concerned about the risks of identification or the disclosure of information. Potential individual harms to think about include: discrimination, identity theft or fraud, financial loss, damage to individual reputation, loss of confidentiality, reversal of pseudonymisation or significant economic or social disadvantage. Implications: High risk then consider DPIA; Data breach notification; Record-keeping; Low risk then may not need to notify or to appoint representative if foreign based Mitigation: specifically you can implement specific suitable technical or organisational measures such as encryption to improve security; pseudonymisation or other steps to de-identify personal data or simply minimise the amount of personal data required for a project. To examine processing activities take a three prong approach: Identify any potential harms Evaluate the severity of the harm Consider the likelihood of the harm occurring. This will allow you to think about what you can do to minimise and mitigate the risks to individuals.
  4. The ICO is required by Article 35(4) of the GDPR to publish a list of types of processing we consider likely to be high risk and so require a DPIA. Our list, which is summarised above, is currently open for consultation until 13 April 2018.
  5. Although the concept of risk runs throughout the GDPR it is not specifically defined. Some examples cited in the Regulation, that are more likely to result in a high risk include: systematic automated profiling large scale monitoring of sensitive data systematic monitoring of a publicly accessible area on large scale Risk needs to be determined in the specific context of your own operations and there is no “one-size fits all” list. However consider in particular how you engage in activities: Processing sensitive data (ethnicity, political or religious beliefs and health, genetic or biometric data) involving vulnerable individuals or children processing personal data on a large scale automated profiling individuals likelihood and severity” of any negative impact of your processing activities on individuals by reference to the nature, scope, context and purpose of processing. For example a vulnerable individual may be particularly concerned about the risks of identification or the disclosure of information. Potential individual harms to think about include: discrimination, identity theft or fraud, financial loss, damage to individual reputation, loss of confidentiality, reversal of pseudonymisation or significant economic or social disadvantage. Implications: High risk then consider DPIA; Data breach notification; Record-keeping; Low risk then may not need to notify or to appoint representative if foreign based Mitigation:specifically you can implement specific suitable technical or organisational measures such as encryption to improve security; pseudonymisation or other steps to de-identify personal data or simply minimise the amount of personal data required for a project. To examine processing activities take a three prong approach: Identify any potential harms Evaluate the severity of the harm Consider the likelihood of the harm occurring. This will allow you to think about what you can do to minimise and mitigate the risks to individuals.
  6. Personal data breach” is “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed.” Important to note that the definition of a personal data breach is wide and for example includes unlawful destruction but tied into the requirement for strong security obligations Relevant Article 29 Working Party guidelines discuss the loss of availability of personal data and indicate that “If the lack of availability of personal data is likely to result in a risk to the rights and freedoms of natural persons, then the controller will need to notify”.  Requirement to notify to the authorities without undue delay and not later than 72 hours … where there is a likelihood of risk … what exactly does that mean? Broad scope for discussion and may be an area where we can expect some guidance In addition to DPA’s also need to notify to data subjects where there is a likelihood of high risk so for example if you send out a cc instead of bcc but there is no other sensitive data no need to notify but if it contains results on individuals health status you will
  7. informing people about security breach important part of managing the incident but not an end in itself. Be clear about who needs to be notified and why e.g. individuals; the ICO; other regulatory bodies; other third parties such as the police and the banks; or the media