SlideShare a Scribd company logo
PERSONAL DATA PROTECTION IN THE EUROPEAN UNION
17 SEPTEMBER 2018 
BETAHAUS X & KIC EUROPE 
DR. MIRA SULEIMENOVA, LL.M.
AGENDA FOR TODAY
15:00 - 15:15
15:15 - 15:30
15:50 - 16:00
16:00 - 16:40
16:40 - 17:00
15:30 - 15:50
Introduction
A Brief History of Data Protection in Europe
Data Protection in South Korea (PIPA) vs Situation in Europe (GDPR)
Coffee Break
GDPR Basics for International Startups
Q&A
A BRIEF HISTORY OF DATA PROTECTION IN EUROPE
Source: Ernst-Oliver Wilhelm A Brief History of the General Data Protection Regulation via iapp.org 
Key info for GDPR
became BINDING on 25 May 2018
concerns ALL EU citizens and residents
PERSONAL DATA means any information relating to an individual,
whether it relates to his or her private, professional or public life
Territorial scope: GLOBAL
Data Protection in South Korea
Data Protection in South Korea
developed IT infrastructure || heavy use of SNSs || technology-literate population
South Korea is the most innovative country in the world according to
Bloomberg Innovation Index
2011 Personal Data Protection Act (PIPA) is among strictest world wide
Breach of Data Protection Laws can result in administrative fines as well as in
criminal penalties, up to imprisonment
PIPA vs GDPR
PIPA vs GDPR
PIPA vs GDPR
PIPA vs GDPR
BREAK
personal data flows
Co.LLC
ONLINE
OFFINE
corporate
customers
retail customers
corp. customers employees
online users
personal contact
fairs
networking
website
email
social media
Co.LLC's employees
personal data flows
Co.LLC
ONLINE
OFFINE
corporate
customers
retail customers
corp. customers employees
online users
personal contact
fairs
networking
website
email
social media
Co.LLC's employees
Korea
Korea + EU
EU
Korean [+ EU] citizens
Bases for collection of
personal data
c o n s e n t
c o n t r a c t
l e g a l o b l i g a t i o n
v i t a l o r p u b l i c i n t e r e s t s
l e g i t i m a t e i n t e r e s t
Consent
I n f o r m e d : w h o , w h y , h o w  
U n a m b i g u o u s : c l e a r l a n g u a g e
F r e e l y g i v e n : n o t r a d e o f f s
O b v i o u s : d o n ' t h i d e i t
G r a n u l a r : s e n s i t i v e d a t a , d i r e c t m a r k e t i n g , e t c .
R e q u i r e a p o s i t i v e a c t i o n : o p t - i n
Consent: Double OPT-IN
Example of 
Processing
internal safeguards external safeguards crisis response
Privacy policy 
Clauses on data
protection in 3rd-
party contracts
(affiliates, partners,
subcontractors)
make sure to have: establish:make sure that:
Data is minimised
Processing is
documented 
Security is strong
Mechanisms to
notify 3rd parties of
changes in data
processing are in
place
Mechanisms to
access, rectify, delete
data 
Procedures to detect,
report & investigate a
data breach 
International Data Transfers
Co.LLC
ONLINE
OFFINE
corporate
customers
retail customers
corp. customers employees
online users
personal contact
fairs
networking
website
email
social media
Co.LLC's employees
Korea
Korea + EU
EU
Korean [+ EU] citizens
Q & A
Thank you
Dr. Mira Suleimenova, LL.M.
medium.com/@miranova
www.linkedin.com/in/mirasuleimenova
mira.suleimenova@gmail.com

More Related Content

Similar to Personal data protection in Europe

Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
FSR Communications and Media
 
Next generation data protection and security for oracle users - the block cha...
Next generation data protection and security for oracle users - the block cha...Next generation data protection and security for oracle users - the block cha...
Next generation data protection and security for oracle users - the block cha...
Ulf Mattsson
 
Next generation data protection and security for oracle users - gdpr blockc...
Next generation data protection and security for oracle users   - gdpr blockc...Next generation data protection and security for oracle users   - gdpr blockc...
Next generation data protection and security for oracle users - gdpr blockc...
Ulf Mattsson
 
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
Dana Gardner
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity Battle
GovLoop
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
Prof. Jacques Folon (Ph.D)
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
Annelore van der Lint
 
Data protection
Data protectionData protection
Data protection
RaviPrashant5
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
Saira Nayak, JD, CIPP/US/E
 
EY Human Capital Conference 2012: Global HR - Data privacy and global mobility
EY Human Capital Conference 2012: Global HR - Data privacy and global mobilityEY Human Capital Conference 2012: Global HR - Data privacy and global mobility
EY Human Capital Conference 2012: Global HR - Data privacy and global mobility
EY
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
Samo Zavašnik
 
Privacy
PrivacyPrivacy
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
FLUZO
 
Digital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the worldDigital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the world
OReillyStrata
 
Is Big Data killing Privacy? Nop, it's inducing a paradigm shift
Is Big Data killing Privacy? Nop, it's inducing a paradigm shiftIs Big Data killing Privacy? Nop, it's inducing a paradigm shift
Is Big Data killing Privacy? Nop, it's inducing a paradigm shift
Aurélie Pols
 
Data_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UKData_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UK
Sally Hunt
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
Symantec
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
Gabor Farkas
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
caniceconsulting
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?
Ulf Mattsson
 

Similar to Personal data protection in Europe (20)

Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
Data Protection and Trade Policy: A Conceptual Framework to Assess Data Prote...
 
Next generation data protection and security for oracle users - the block cha...
Next generation data protection and security for oracle users - the block cha...Next generation data protection and security for oracle users - the block cha...
Next generation data protection and security for oracle users - the block cha...
 
Next generation data protection and security for oracle users - gdpr blockc...
Next generation data protection and security for oracle users   - gdpr blockc...Next generation data protection and security for oracle users   - gdpr blockc...
Next generation data protection and security for oracle users - gdpr blockc...
 
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
How Enterprises Can Gain Data Privacy, and Build their Bottom Lines, By Compl...
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity Battle
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
Data protection
Data protectionData protection
Data protection
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
EY Human Capital Conference 2012: Global HR - Data privacy and global mobility
EY Human Capital Conference 2012: Global HR - Data privacy and global mobilityEY Human Capital Conference 2012: Global HR - Data privacy and global mobility
EY Human Capital Conference 2012: Global HR - Data privacy and global mobility
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
 
Privacy
PrivacyPrivacy
Privacy
 
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
 
Digital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the worldDigital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the world
 
Is Big Data killing Privacy? Nop, it's inducing a paradigm shift
Is Big Data killing Privacy? Nop, it's inducing a paradigm shiftIs Big Data killing Privacy? Nop, it's inducing a paradigm shift
Is Big Data killing Privacy? Nop, it's inducing a paradigm shift
 
Data_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UKData_Privacy_Protection_brochure_UK
Data_Privacy_Protection_brochure_UK
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?
 

More from Dr. Mira Suleimenova, CIPPe

Introduction to GDPR for Startups
Introduction to GDPR for StartupsIntroduction to GDPR for Startups
Introduction to GDPR for Startups
Dr. Mira Suleimenova, CIPPe
 
Scaling to New Markets
Scaling to New MarketsScaling to New Markets
Scaling to New Markets
Dr. Mira Suleimenova, CIPPe
 
New rules of the game: privacy conscious world
New rules of the game: privacy conscious worldNew rules of the game: privacy conscious world
New rules of the game: privacy conscious world
Dr. Mira Suleimenova, CIPPe
 
European GDPR for Good Technology Collective (GTC)
European GDPR for Good Technology Collective (GTC)European GDPR for Good Technology Collective (GTC)
European GDPR for Good Technology Collective (GTC)
Dr. Mira Suleimenova, CIPPe
 
User Perspective: Right to be forgotten
User Perspective: Right to be forgottenUser Perspective: Right to be forgotten
User Perspective: Right to be forgotten
Dr. Mira Suleimenova, CIPPe
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
Dr. Mira Suleimenova, CIPPe
 
Privacy by Design: legal perspective
Privacy by Design: legal perspectivePrivacy by Design: legal perspective
Privacy by Design: legal perspective
Dr. Mira Suleimenova, CIPPe
 

More from Dr. Mira Suleimenova, CIPPe (7)

Introduction to GDPR for Startups
Introduction to GDPR for StartupsIntroduction to GDPR for Startups
Introduction to GDPR for Startups
 
Scaling to New Markets
Scaling to New MarketsScaling to New Markets
Scaling to New Markets
 
New rules of the game: privacy conscious world
New rules of the game: privacy conscious worldNew rules of the game: privacy conscious world
New rules of the game: privacy conscious world
 
European GDPR for Good Technology Collective (GTC)
European GDPR for Good Technology Collective (GTC)European GDPR for Good Technology Collective (GTC)
European GDPR for Good Technology Collective (GTC)
 
User Perspective: Right to be forgotten
User Perspective: Right to be forgottenUser Perspective: Right to be forgotten
User Perspective: Right to be forgotten
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Privacy by Design: legal perspective
Privacy by Design: legal perspectivePrivacy by Design: legal perspective
Privacy by Design: legal perspective
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Personal data protection in Europe

  • 1. PERSONAL DATA PROTECTION IN THE EUROPEAN UNION 17 SEPTEMBER 2018  BETAHAUS X & KIC EUROPE  DR. MIRA SULEIMENOVA, LL.M.
  • 2. AGENDA FOR TODAY 15:00 - 15:15 15:15 - 15:30 15:50 - 16:00 16:00 - 16:40 16:40 - 17:00 15:30 - 15:50 Introduction A Brief History of Data Protection in Europe Data Protection in South Korea (PIPA) vs Situation in Europe (GDPR) Coffee Break GDPR Basics for International Startups Q&A
  • 3. A BRIEF HISTORY OF DATA PROTECTION IN EUROPE Source: Ernst-Oliver Wilhelm A Brief History of the General Data Protection Regulation via iapp.org 
  • 4. Key info for GDPR became BINDING on 25 May 2018 concerns ALL EU citizens and residents PERSONAL DATA means any information relating to an individual, whether it relates to his or her private, professional or public life Territorial scope: GLOBAL
  • 5. Data Protection in South Korea
  • 6. Data Protection in South Korea developed IT infrastructure || heavy use of SNSs || technology-literate population South Korea is the most innovative country in the world according to Bloomberg Innovation Index 2011 Personal Data Protection Act (PIPA) is among strictest world wide Breach of Data Protection Laws can result in administrative fines as well as in criminal penalties, up to imprisonment
  • 11. BREAK
  • 12. personal data flows Co.LLC ONLINE OFFINE corporate customers retail customers corp. customers employees online users personal contact fairs networking website email social media Co.LLC's employees
  • 13. personal data flows Co.LLC ONLINE OFFINE corporate customers retail customers corp. customers employees online users personal contact fairs networking website email social media Co.LLC's employees Korea Korea + EU EU Korean [+ EU] citizens
  • 14. Bases for collection of personal data c o n s e n t c o n t r a c t l e g a l o b l i g a t i o n v i t a l o r p u b l i c i n t e r e s t s l e g i t i m a t e i n t e r e s t
  • 15. Consent I n f o r m e d : w h o , w h y , h o w   U n a m b i g u o u s : c l e a r l a n g u a g e F r e e l y g i v e n : n o t r a d e o f f s O b v i o u s : d o n ' t h i d e i t G r a n u l a r : s e n s i t i v e d a t a , d i r e c t m a r k e t i n g , e t c . R e q u i r e a p o s i t i v e a c t i o n : o p t - i n
  • 17. Processing internal safeguards external safeguards crisis response Privacy policy  Clauses on data protection in 3rd- party contracts (affiliates, partners, subcontractors) make sure to have: establish:make sure that: Data is minimised Processing is documented  Security is strong Mechanisms to notify 3rd parties of changes in data processing are in place Mechanisms to access, rectify, delete data  Procedures to detect, report & investigate a data breach 
  • 18. International Data Transfers Co.LLC ONLINE OFFINE corporate customers retail customers corp. customers employees online users personal contact fairs networking website email social media Co.LLC's employees Korea Korea + EU EU Korean [+ EU] citizens
  • 19. Q & A
  • 20. Thank you Dr. Mira Suleimenova, LL.M. medium.com/@miranova www.linkedin.com/in/mirasuleimenova mira.suleimenova@gmail.com